802.1x for PC hosting Hyper V switch where ISE sits behind the vswitch
the same bad idea ... The ISE has to be reachable all the time to do the authentication.
MS120-8<>HyperV switch<>physical end host <<<<< but I believe this would inherit the access policy causing issues for the hosted VMs?
with physical end host you probably mean the VM? Because I had no idea how to connect a physical host to a virtual switch. IMO still a bad idea, but it could work in two scenarios:
1) The switch-port is configured for multiple-host mode and only the HyperV has to authenticate to the switch. All VMs are allowed to connect "piggyback" on this connection.
2) The switch-port is configured for multi-auth, here all VMs need a supplicant to authenticate to the network. This will only work if the virtual switch does not interfere with the EAPOL communication.
MS120-8<>physical adapter of host<>Windows10 <<<< Taking vswitch out of the flow
This is the best way to do it from the 802.1X standpoint. One port, one end-device. But likely not the best solution from a VM standpoint.
If you found this post helpful, please give it Kudos. If my answer solves your problem, please click Accept as Solution so others can benefit from it.